
{"id":7108,"date":"2025-05-26T14:27:52","date_gmt":"2025-05-26T12:27:52","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=7108"},"modified":"2025-05-26T14:27:52","modified_gmt":"2025-05-26T12:27:52","slug":"tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2025\/05\/26\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\/","title":{"rendered":"TikTok : Comment des Hackers Diffusent leurs Malwares Gr\u00e2ce \u00e0 des vid\u00e9os virales"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/pic.clubic.com\/cb9529a62303070\/1200x800\/smart\/tiktok.jpg\" alt=\"Ces hackers utilisent les vid\u00e9os virales de TikTok pour d\u00e9ployer leurs  malwares\" \/><\/p>\n<h2>Des pirates informatiques d\u00e9tournent des vid\u00e9os populaires sur TikTok pour propager des malwares. Derri\u00e8re des promesses all\u00e9chantes de piratage facile, les victimes installent sans le savoir de dangereux logiciels voleurs de donn\u00e9es.<\/h2>\n<p>L&rsquo;immense popularit\u00e9 de TikTok attire d\u00e9sormais des hackers bien d\u00e9cid\u00e9s \u00e0 profiter de la confiance et du manque de m\u00e9fiance des utilisateurs. Selon une r\u00e9cente enqu\u00eate de<a href=\"https:\/\/www.trendmicro.com\/fr_fr\/research\/25\/e\/tiktok-videos-infostealers.html\" target=\"_blank\" rel=\"noopener\">\u00a0Trend Micro<\/a>, des campagnes d&rsquo;envergure exploitent le r\u00e9seau social pour diffuser des malwares. L&rsquo;astuce est simple, mais terriblement efficace : leur proposer des tutoriels pr\u00e9tendant d\u00e9bloquer gratuitement des fonctionnalit\u00e9s payantes de logiciels populaires comme Spotify Premium, CapCut ou Microsoft Office. Malheureusement, la r\u00e9alit\u00e9 derri\u00e8re ces vid\u00e9os est bien plus sombre.<\/p>\n<p>&nbsp;<\/p>\n<h2 id=\"77t5p\" class=\"no-inject-ads\"><strong>Vid\u00e9os attirantes, malwares redoutables<\/strong><\/h2>\n<p>Dans ces vid\u00e9os, visionn\u00e9es parfois plusieurs centaines de milliers de fois, une voix calme et synth\u00e9tique promet une astuce magique : quelques commandes simples \u00e0 saisir dans l&rsquo;outil PowerShell de Windows, et voil\u00e0 Spotify Premium gratuit. C&rsquo;est tentant, d&rsquo;autant que ces vid\u00e9os probablement g\u00e9n\u00e9r\u00e9es par IA ressemblent \u00e0 s&rsquo;y m\u00e9prendre \u00e0 des tutos inoffensifs.<\/p>\n<p>Pourtant, il ne faut en aucun cas tomber dans le panneau. Elles d\u00e9clenchent discr\u00e8tement le t\u00e9l\u00e9chargement et l&rsquo;ex\u00e9cution de malwares puissants, notamment Vidar et StealC. Ces deux-l\u00e0 sont sp\u00e9cialis\u00e9s dans le vol massif d&rsquo;informations. Identifiants et mots de passe stock\u00e9s dans les navigateurs, cookies de sessions actives, captures d&rsquo;\u00e9cran, donn\u00e9es de cartes bancaires, portefeuilles de cryptomonnaies, fichiers sensibles enregistr\u00e9s sur l&rsquo;ordinateur\u2026 Les logiciels malveillants siphonnent tout. Les fichiers d\u00e9rob\u00e9s sont ensuite discr\u00e8tement envoy\u00e9s \u00e0 un serveur distant contr\u00f4l\u00e9 par les hackeurs.<\/p>\n<p>&nbsp;<\/p>\n<h2 id=\"501u1\" class=\"no-inject-ads\"><strong>Vicieux et difficile \u00e0 d\u00e9tecter<\/strong><\/h2>\n<p>Ce qui rend cette attaque particuli\u00e8rement vicieuse, c&rsquo;est l&rsquo;absence quasi totale de codes malveillants directement int\u00e9gr\u00e9s dans les vid\u00e9os elles-m\u00eames. Toute l&rsquo;op\u00e9ration de t\u00e9l\u00e9chargement et d&rsquo;installation du malware est effectu\u00e9e par l&rsquo;utilisateur lui-m\u00eame apr\u00e8s visionnage des instructions. Cons\u00e9quence : les syst\u00e8mes antivirus traditionnels, habitu\u00e9s \u00e0 d\u00e9tecter des fichiers ou scripts suspects, sont souvent incapables d&rsquo;identifier la menace. En plus, les pirates prennent soin de dissimuler au maximum leurs traces. Ils cr\u00e9ent des dossiers cach\u00e9s qui neutralisent temporairement Windows Defender et assurent une persistance au d\u00e9marrage en modifiant le registre du syst\u00e8me.<\/p>\n<p>Cette m\u00e9thode de propagation, baptis\u00e9e \u00ab\u00a0ClickFix\u00a0\u00bb est si efficace que m\u00eame les utilisateurs avertis peuvent se faire avoir. Attir\u00e9 par simplicit\u00e9 apparente des vid\u00e9os et leur forte viralit\u00e9, on a vite fait de suivre le faux tutoriel. Les pirates vont jusqu&rsquo;\u00e0 utiliser des comptes multiples \u2013 aujourd&rsquo;hui supprim\u00e9s \u2013 pour poster massivement les vid\u00e9os et contourner la mod\u00e9ration de TikTok.<\/p>\n<p>Pour \u00e9viter de tomber dans le pi\u00e8ge, il n&rsquo;y a pas de secret : r\u00e9sister \u00e0 la tentation des solutions miracles diffus\u00e9es sur les r\u00e9seaux sociaux est la cl\u00e9. La r\u00e8gle est simple : si une vid\u00e9o TikTok vous propose d&rsquo;activer gratuitement des logiciels, il y a fort \u00e0 parier qu&rsquo;il s&rsquo;agit d&rsquo;une escroquerie. En cas de doute, modifiez imm\u00e9diatement tous vos mots de passe.<\/p>\n<p>avec capital<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Des pirates informatiques d\u00e9tournent des vid\u00e9os populaires sur TikTok pour propager des malwares. Derri\u00e8re des promesses all\u00e9chantes de piratage facile, les victimes installent sans le savoir de dangereux logiciels voleurs [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7109,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,11,41],"tags":[],"class_list":["post-7108","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cybersecurite","category-reseaux-sociaux"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>TikTok : Comment des Hackers Diffusent leurs Malwares Gr\u00e2ce \u00e0 des vid\u00e9os virales - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2025\/05\/26\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TikTok : Comment des Hackers Diffusent leurs Malwares Gr\u00e2ce \u00e0 des vid\u00e9os virales - ParlonsTechs\" \/>\n<meta property=\"og:description\" content=\"Des pirates informatiques d\u00e9tournent des vid\u00e9os populaires sur TikTok pour propager des malwares. Derri\u00e8re des promesses all\u00e9chantes de piratage facile, les victimes installent sans le savoir de dangereux logiciels voleurs [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2025\/05\/26\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-26T12:27:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/05\/social_affiche-10.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"TikTok : Comment des Hackers Diffusent leurs Malwares Gr\u00e2ce \u00e0 des vid\u00e9os virales - ParlonsTechs\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/05\/social_affiche-10.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/05\\\/26\\\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/05\\\/26\\\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"TikTok : Comment des Hackers Diffusent leurs Malwares Gr\u00e2ce \u00e0 des vid\u00e9os virales\",\"datePublished\":\"2025-05-26T12:27:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/05\\\/26\\\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\\\/\"},\"wordCount\":569,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/05\\\/26\\\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/ab-11.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"CyberS\u00e9curit\u00e9\",\"R\u00e9seaux Sociaux\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/05\\\/26\\\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/05\\\/26\\\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/05\\\/26\\\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\\\/\",\"name\":\"TikTok : Comment des Hackers Diffusent leurs Malwares Gr\u00e2ce \u00e0 des vid\u00e9os virales - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/05\\\/26\\\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/05\\\/26\\\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/ab-11.jpg\",\"datePublished\":\"2025-05-26T12:27:52+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/05\\\/26\\\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/05\\\/26\\\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/05\\\/26\\\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/ab-11.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/ab-11.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/05\\\/26\\\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TikTok : Comment des Hackers Diffusent leurs Malwares Gr\u00e2ce \u00e0 des vid\u00e9os virales\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TikTok : Comment des Hackers Diffusent leurs Malwares Gr\u00e2ce \u00e0 des vid\u00e9os virales - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2025\/05\/26\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\/","og_locale":"fr_FR","og_type":"article","og_title":"TikTok : Comment des Hackers Diffusent leurs Malwares Gr\u00e2ce \u00e0 des vid\u00e9os virales - ParlonsTechs","og_description":"Des pirates informatiques d\u00e9tournent des vid\u00e9os populaires sur TikTok pour propager des malwares. Derri\u00e8re des promesses all\u00e9chantes de piratage facile, les victimes installent sans le savoir de dangereux logiciels voleurs [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2025\/05\/26\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\/","og_site_name":"Parlons Techs - Store","article_published_time":"2025-05-26T12:27:52+00:00","og_image":[{"width":900,"height":500,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/05\/social_affiche-10.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_title":"TikTok : Comment des Hackers Diffusent leurs Malwares Gr\u00e2ce \u00e0 des vid\u00e9os virales - ParlonsTechs","twitter_image":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/05\/social_affiche-10.jpg","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2025\/05\/26\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/05\/26\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"TikTok : Comment des Hackers Diffusent leurs Malwares Gr\u00e2ce \u00e0 des vid\u00e9os virales","datePublished":"2025-05-26T12:27:52+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/05\/26\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\/"},"wordCount":569,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/05\/26\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/05\/ab-11.jpg","articleSection":["Actualit\u00e9","CyberS\u00e9curit\u00e9","R\u00e9seaux Sociaux"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2025\/05\/26\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2025\/05\/26\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\/","url":"https:\/\/parlonstechs.com\/all\/2025\/05\/26\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\/","name":"TikTok : Comment des Hackers Diffusent leurs Malwares Gr\u00e2ce \u00e0 des vid\u00e9os virales - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/05\/26\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/05\/26\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/05\/ab-11.jpg","datePublished":"2025-05-26T12:27:52+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/05\/26\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2025\/05\/26\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2025\/05\/26\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/05\/ab-11.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/05\/ab-11.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2025\/05\/26\/tiktok-comment-des-hackers-diffusent-leurs-malwares-grace-a-des-videos-virales\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"TikTok : Comment des Hackers Diffusent leurs Malwares Gr\u00e2ce \u00e0 des vid\u00e9os virales"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/7108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=7108"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/7108\/revisions"}],"predecessor-version":[{"id":7111,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/7108\/revisions\/7111"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/7109"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=7108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=7108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=7108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}